Cyber Adversary Tradecraft

Course Group: 
Cyber Security

COURSE OVERVIEW

The increasing awareness in the public domain of cyberspace threats is causing nearly all government agencies to include cyber as part of their strategic agenda. But cyber is amorphous and recognizing the threats and opportunities it poses requires an understanding of cyber-adversary methods and technologies.

Who Should Attend?

Course Outline

Course Outcomes

Presenter Background

Dates and Registration

Duration: 4 Days (adjustable)

Delivery Mode: Classroom/CyberRange

Locations

Advertised: Canberra

In-house: Contact the  for more information and to arrange a quote. Recommended for groups of 10 or more.

What you will receive:

  • Comprehensive set of course notes.
  • UNSW certificate of attendance/completion.
  • Morning tea, lunch and afternoon tea.

Masters Credit: 72 hours (12 working days) of approved short course training (plus an assessment) can be credited as an unspecified elective on our Masters of Cyber Security / Cyber Security Operations.

 


 

WHO SHOULD ATTEND

It will be assumed that delegates will be familiar with internet protocols and network concepts. Additionally, delegates will need to be familiar with cyber exploitation terms and meanings. All participants will need to hold an Australian Government Security clearance.

 


 

COURSE OUTLINE

Concepts will be grounded in practical exercises. A fictitious scenario of a government agency conducting a cyber-operation against another fictitious government will provide the context for the practical exercises. Delegates will step through a structured approach to planning and execution which covers:

  • Tasking – Defining operational objectives and tasks from higher national priorities;
  • Targeting – Identifying and analyzing the environment and target to construct a complete picture of the operating space;
  • Tactics – Employing the full range of cyber tactics (Discovery, Access, Assurance, Leverage) to engage targets and move towards completing sub-objectives;
  • Techniques – Selecting techniques, e.g. DNS enumeration, SSH tunneling, and payload encoding which are appropriate to the target and desired outcome; and
  • Tools – Matching tools to techniques and understanding their effects, footprint, and tradeoffs.

A simulated cyber environment will enable practical exercises using various open-source security and exploitation software applications.

 


 

COURSE OUTCOMES

This course is aimed at government personnel who are involved with contributing to government cyber strategy, policy or operations. Delegates will develop a detailed understanding of the processes, tactics and tools used by a cyber-adversary in exploiting computer networks to fulfill an information requirement.

 


 

AUSTRALIAN CENTRE FOR CYBER SECURITY

The Australian Centre for Cyber Security (ACCS) is a focal point for the research of some 60 scholars from various faculties across UNSW who conduct research work on different aspects of cyber security. The Centre is based in Canberra at the Defence Force Academy that provides both advanced research as well as undergraduate and graduate education on cyber security. ACCS brings together the biggest concentration of research and tertiary education for the multi-disciplinary study of cyber security in any single university in the Southern hemisphere. A number of ACCS scholars, in areas ranging from information technology and engineering to law and politics, have significant international reputations for their work.  

No dates? Or unable to attend dates shown? Submit an Expression of Interest below to be notified of upcoming courses.

 

 

COURSE AVAILABILITY